MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e9c607f263a990db1bf0465c8688ed7ce7e5f294845041fb56af313df34f45df. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AsyncRAT


Vendor detections: 5


Intelligence 5 IOCs YARA File information Comments

SHA256 hash: e9c607f263a990db1bf0465c8688ed7ce7e5f294845041fb56af313df34f45df
SHA3-384 hash: d3f2cd6a77abceaeb46b937940298305988ab4259d3e5fd5fc07a47ab726a94a98abee30c7793da4e642631aea600e26
SHA1 hash: 43438e798b9affd9fcb871dfb8c31f42b06f5b4c
MD5 hash: 67deca381bb44b96fa13bead0adc1a6b
humanhash: hawaii-jupiter-artist-stairway
File name:svchost.exe
Download: download sample
Signature AsyncRAT
File size:266'240 bytes
First seen:2020-04-11 11:49:24 UTC
Last seen:2020-04-11 12:44:52 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'652 x AgentTesla, 19'462 x Formbook, 12'204 x SnakeKeylogger)
ssdeep 6144:8+XMx2G+FJWeNMcmiz9NL+BV4eGLq+mntspb9oQsoNSDNfmzR:L62xFJWe/miz9Z+BV4PW+ueQ
Threatray 298 similar samples on MalwareBazaar
TLSH DC445C242AFB5119F073EFB64AE87596CA6EFB333606D45D1092038A4B23B41ED9153F
Reporter abuse_ch
Tags:AsyncRAT COVID-19 exe RAT


Avatar
abuse_ch
COVID-19 themed malspam distributing AsyncRAT:

HELO: mailcan.primotedesco.com.br
Sending IP: 200.183.172.2
From: Charles Taylor <ct2844@naver.com> (Remote Personal Assistant needed)
Subject: Requesting for a Remote Assistant due to Covid-19
Attachment: Payment-Delayed.xls
Attachment: Payment-Delayed.doc

AsyncRAT payload URL:
https://www.chipmarkets.com//vendor/phpunit/phpunit/src/Util/PHP/admin/svchost.exe

AsyncRAT C2:
babyboyhammer2.duckdns.org:7707 (176.31.26.213)

Intelligence


File Origin
# of uploads :
2
# of downloads :
109
Origin country :
n/a
Vendor Threat Intelligence
Result
Threat name:
AsyncRAT
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Behaviour
Behavior Graph:
n/a
Gathering data
Threat name:
ByteCode-MSIL.Trojan.Agensla
Status:
Malicious
First seen:
2020-04-11 11:40:31 UTC
File Type:
PE (.Net Exe)
Extracted files:
4
AV detection:
28 of 31 (90.32%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AsyncRAT

Executable exe e9c607f263a990db1bf0465c8688ed7ce7e5f294845041fb56af313df34f45df

(this sample)

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high

Comments